操作步驟
步驟圖解
High | Cloud Metadata Potentially Exposed |
Description | The Cloud Metadata Attack attempts to abuse a misconfigured NGINX server in order to access the instance metadata maintained by cloud service providers such as AWS, GCP and Azure. |
All of these providers provide metadata via an internal unroutable IP address '169.254.169.254' - this can be exposed by incorrectly configured NGINX servers and accessed by using this IP address in the Host header field. | |
URL | https://xxx.com.tw/latest/meta-data/ |
Method | GET |
Parameter | |
Attack | 169.254.169.254 |
Evidence | |
Instances | 1 |
Solution | Do not trust any user data in NGINX configs. In this case it is probably the use of the $host variable which is set from the 'Host' header and can be controlled by an attacker. |
Reference | https://www.nginx.com/blog/trust-no-one-perils-of-trusting-user-input/ |
CWE Id | |
WASC Id | |
Plugin Id | 90034 |
install docker
https://blog.yslifes.com/archives/3080
yum install -y yum-utils
yum-config-manager --add-repo https://download.docker.com/linux/centos/docker-ce.repo
yum install -y docker-ce docker-ce-cli containerd.io docker-compose-plugin
systemctl start docker
systemctl enable docker
#docker image path: /var/lib/docker/containers
install redmine 5
https://github.com/sameersbn/docker-redmine#installation
docker pull sameersbn/redmine:latest
mkdir redmine5
cd redmine5
wget https://raw.githubusercontent.com/sameersbn/docker-redmine/master/docker-compose.yml
docker compose up